Email Alerts
-
Multiple flaws in Trillian chat program
Attackers could access sensitive information and run malicious code by exploiting multiple flaws in Trillian, a chat program popular in many enterprises. Article | 01 May 2007
-
Yahoo fixes Messenger flaw
Attackers could exploit a flaw in Yahoo Messenger to hijack targeted machines, but a fix is available. Article | 04 Apr 2007
-
Companies take IM threats seriously
IT managers are finding security tools to shield internal systems from IM attack by keeping malware and phishers out, while letting trusted clients and friends in. Article | 18 Jan 2007
-
Security pros grumble over spam increase
Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action. Article | 03 Jan 2007
-
Skype Trojan: Much ado about nothing?
This week in Security Blog Log: A Trojan horse has captured headlines by targeting Skype users. But some believe the threat is being blown out of proportion. Column | 22 Dec 2006
-
Expert offers tips to bolster messaging security
In this edition of Security Wire Weekly, Burton Group analyst Diana Kelley explains how to lock down messaging programs as part of our three-day special report on the subject. Article | 13 Dec 2006
-
IT pros look for ways to lock down IM
Special Report: To control growing IM threats, administrators are trying to limit which programs can be used or ban the technology altogether. But that's not always possible. Article | 12 Dec 2006
-
Inside the numbers: Messaging (in)security
In August, SearchSecurity.com surveyed 250 IT pros from a variety of industries about messaging security programs. Here are some of the questions we asked and their responses. Article | 11 Dec 2006
-
Messaging insecurity fuels data leakage fears
Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted. Article | 11 Dec 2006
-
Instant messaging attacks rise in October
In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P programs. Article | 31 Oct 2006
Security Management Strategies for the CIO